Sycope dictionary

We understand how important it is to build the knowledge around the solution we offer - we provide you with extra insights that can help in using the Sycope solution more effectively.

Learn more
Newest additions
Check our vocabulary
Internet Peering
A direct network interconnection between ISPs, enabling mutual traffic exchange, enhancing efficiency, and reducing costs.
Learn more >
Intrusion Detecting System
A security solution that monitors network traffic for signs of suspicious activity, cyberattacks, or policy violations.
Learn more >
IoA (Indicator of Attack)
An indicator of attack is a sign of suspicious activity that may show an attack is in progress or about to happen. It helps security teams detect and stop threats early.
Learn more >
IoC (Indicator of Compromise)
An indicator of compromise is a digital artifact or behavior that may signal a security breach. It helps security teams detect, investigate, and respond to threats quickly.
Learn more >
IPFIX
A standardized method for exporting network flow data, enabling detailed analysis of traffic patterns.
Learn more >
IPS (Intrusion Prevention System)
An intrusion prevention system monitors network traffic for suspicious activity and blocks detected attacks automatically. It helps protect systems and data from unauthorized access and other threats.
Learn more >
Lateral Movement
Lateral movement is a post-breach technique where attackers move across a network to escalate privileges and access sensitive systems and data.
Learn more >
Malware
Malicious software designed to infiltrate systems, steal data, disrupt operations, or sabotage computers without user knowledge or consent.
Learn more >
Man-in-the-Middle (MitM)
Attack where a hacker intercepts and eavesdrops on communications between two parties, potentially stealing data or altering information.
Learn more >
MITTRE ATT&CK
A knowledge base that classifies and documents cyber threat tactics and techniques enabling effective defence against cyber attacks.
Learn more >
MTTD (Mean Time to Detect)
The average time it takes to detect a security threat or incident. It measures how quickly an organization identifies problems so it can respond sooner and reduce damage.
Learn more >
MTTR (Mean Time to Repair)
The average time needed to repair a system or recover from an incident after a failure is detected. It measures how quickly operations can be restored and downtime reduced.
Learn more >
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.